Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
18
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,638
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Some recent research aspects of threshold cryptography
other
Author(s):
Yvo Desmedt
Publication date
(Online):
June 17 2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
RWTH Aachen Physics Collection
Most cited references
18
Record
: found
Abstract
: not found
Article
: not found
Communication Theory of Secrecy Systems*
C. Shannon
(1949)
0
comments
Cited
1046
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Polynomial Codes Over Certain Finite Fields
I S Reed
,
G G Solomon
(1960)
0
comments
Cited
341
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The Knowledge Complexity of Interactive Proof Systems
Shafi Goldwasser
,
Silvio Micali
,
Charles Rackoff
(1989)
0
comments
Cited
321
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1998
Publication date (Online):
June 17 2005
Pages
: 158-173
DOI:
10.1007/BFb0030418
SO-VID:
68cbc2b7-a879-4be6-9f8e-a3eb304ee65c
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
A general theory of codes, II: Paradigms and homomorphisms
pp. 32
Improving the higher order differential attack and cryptanalysis of the KN cipher
pp. 43
An optimised linear attack on pseudorandom generators using a non-linear combiner
pp. 55
Cryptanalysis of message authentication codes
pp. 66
The least witness of a composite number
pp. 75
Fast algorithm for finding a small root of a quadratic modular equation
pp. 82
Modified Finite Automata Public Key Cryptosystem
pp. 96
Modified ElGamal cryptosystem
pp. 109
Remarks on blind decryption
pp. 116
High-speed cryptography
pp. 121
Secure applications of low-entropy keys
pp. 135
A key escrow system of the RSA cryptosystem
pp. 147
A key escrow system with protecting user's privacy by blind decoding
pp. 158
Some recent research aspects of threshold cryptography
pp. 174
A high-speed small RSA encryption LSI with low power dissipation
pp. 188
The case for a secure multi-application smart card operating system
pp. 198
An augmented family of cryptographic Parity Circuits
pp. 209
A new byte-oriented block cipher
pp. 221
Practice-oriented provable-security
pp. 232
A framework for the management of information security
pp. 246
Specifying security in a composite system
pp. 256
On rough sets and inference analysis
pp. 266
Arbitrated unconditionally secure authentication scheme with multi-senders
pp. 273
Group signatures for hierarchical multigroups
pp. 282
Threshold proxy signature schemes
pp. 291
Signcryption and its applications in efficient public key solutions
pp. 313
A new digital cash scheme based on blind Nyberg-Rueppel digital signature
pp. 321
An incremental payment method for internet based streaming real-time media
pp. 328
A new identity-based key exchange protocol minimizing computation and communication
pp. 335
The application of ID-based key distribution systems to an elliptic curve
pp. 345
On reconciliation of discrepant sequences shared through quantum mechanical channels
Similar content
4,638
A compressive data gathering method based on ElGamal cryptography
Authors:
X Yu
,
K. Dong
,
X Li
…
On Identity-Based Cryptography and Grid Computing
Authors:
H. C. LIM
,
M. J. B. Robshaw
,
H. S. Lim
Lattice-Based Cryptography
Authors:
Oded Regev
See all similar
Cited by
7
Threshold Implementations Against Side-Channel Attacks and Glitches
Authors:
Svetla Nikova
,
Christian Rechberger
,
Vincent Rijmen
A Separable Threshold Ring Signature Scheme
Authors:
Joseph K. Liu
,
Victor K. Wei
,
Duncan S. Wong
An Approach to Identity Management in Clouds without Trusted Third Parties
Authors:
Akram Sarhan
,
Leszek Lilien
See all cited by